Maverics Identity Orchestration Platform

Maverics Identity Orchestration Platform

Strata’s Maverics Identity Orchestration Platform provides an abstraction layer that decouples apps from identity and natively integrates with cloud platforms, cloud identity systems, and on-premises identity and app infrastructures. The Maverics Orchestrator can also run as a standalone on-premises instance to manage identity for your identity and app infrastructures.

Maverics Identity Orchestrator users

Maverics is used by traditional IT operators of legacy identity systems, cloud architects, and platform administrators. It is particularly useful for those working on legacy identity modernization or migration projects and those working on managing identity across a set of distributed cloud platforms.

Maverics capabilities

The Maverics platform can:

  • Modernize app IAM or IDPs: Switch clouds, swap IDPs, or deploy the next big thing in identity — without touching the apps.
  • Add MFA & passwordless to any app: Deploy modern authentication for hundreds of apps in hours — without leaving any unprotected.
  • Layer identity resilience into your IDPs: Add always-on protection against unexpected outages — without building it yourself.
  • Bridge identity and policy between clouds: Scale your architecture and secure apps with multi-cloud and multi-identity options — without refactoring.
  • Build orchestrated user journeys: Create a seamless, secure identity experience for every user — without writing any code.

Deploy an on-premises orchestrator

Manually configure an on-premises orchestrator

Use our developer documentation to understand the end-to-end process of manually configuring an orchestrator and running it on-premises.

Use RP & IDP orchestrators

Orchestrators can be deployed to proxy upstream applications and use configuration to control how authentication and authorization is performed by different identity systems connected to the orchestrator’s fabric. You can also deploy orchestrators on the same host as any web server as a local proxy to handle authentication and enforce policies for applications running on those web servers. Find out how to deploy RP & IDP orchestrators or how to deploy a web server with a local orchestrator.